全文获取类型
收费全文 | 8324篇 |
免费 | 484篇 |
国内免费 | 143篇 |
专业分类
财政金融 | 392篇 |
工业经济 | 642篇 |
计划管理 | 2926篇 |
经济学 | 1113篇 |
综合类 | 979篇 |
运输经济 | 214篇 |
旅游经济 | 102篇 |
贸易经济 | 1470篇 |
农业经济 | 277篇 |
经济概况 | 834篇 |
信息产业经济 | 2篇 |
出版年
2024年 | 60篇 |
2023年 | 155篇 |
2022年 | 185篇 |
2021年 | 243篇 |
2020年 | 312篇 |
2019年 | 218篇 |
2018年 | 208篇 |
2017年 | 201篇 |
2016年 | 240篇 |
2015年 | 347篇 |
2014年 | 714篇 |
2013年 | 698篇 |
2012年 | 801篇 |
2011年 | 915篇 |
2010年 | 656篇 |
2009年 | 415篇 |
2008年 | 557篇 |
2007年 | 456篇 |
2006年 | 410篇 |
2005年 | 324篇 |
2004年 | 223篇 |
2003年 | 200篇 |
2002年 | 128篇 |
2001年 | 114篇 |
2000年 | 56篇 |
1999年 | 23篇 |
1998年 | 27篇 |
1997年 | 19篇 |
1996年 | 20篇 |
1995年 | 7篇 |
1994年 | 3篇 |
1993年 | 8篇 |
1992年 | 1篇 |
1991年 | 6篇 |
1988年 | 1篇 |
排序方式: 共有8951条查询结果,搜索用时 390 毫秒
1.
《International Journal of Research in Marketing》2022,39(3):867-887
This article examines peer influences from network relationships within a social network game (i.e., embeddedness) and across such games (i.e., multiplexity). Drawing on social influence theory, we develop a bivariate Poisson model of users’ repeated visits and latent attrition that accommodates peer interaction after controlling for homophily. We estimate the model using data from two social network games with considerable overlap among network members. We find that friends who are only multiplex across games exert greater peer influence on users’ game visits than members who are embedded within a single game. We also determined that ignoring network multiplexity across games may lead firms to mistarget users due to biased peer influences of embedded friends. This result provides an unresearched explanation—strength of peer influence—for the mixed findings in previous literature on network embeddedness. We utilized our results to conduct several scenario analyses to demonstrate how firms can effectively manage users’ engagement and target users in multiple social network games. 相似文献
2.
ABSTRACTThe aviation e-service system is an important part of support for business communication in regions covered by Belt and Road initiative. In exploring the role of airline companies in this system, we examine the structure of the network, which consists of airlines interconnections based on small data of individual attributes of aviation companies in aviation e-services, and study these interconnections across different groups using block modeling. The heuristic solution of airline companies in development of international communication and cooperation is further discussed. Among our policy implications for global managers, we suggest the enhancement of cross-regional cooperation among airlines. 相似文献
3.
《Journal of Retailing》2022,98(2):277-293
This research examines how consumers’ intentions to purchase food change depending on the visualisation mode (3D vs. AR) and product format (served vs. packaged). In three studies, we demonstrate that mental simulation of eating experiences (process and outcome) mediate these effects. Study 1 shows that AR visualisation of a served food improves simulation of the eating process over 3D visualisation, with a positive effect on purchase intention. Study 2 reveals that 3D visualisation improves purchase intention for packaged products (high instrumental properties) over served products (low instrumental properties) while the opposite is true for AR visualisation. In addition, interactivity and immersion mediate the effects of 3D (vs. AR) on mental simulation of the eating process for packaged products. Study 3 extends these results by showing that 3D increases purchase intention by eliciting mental simulation of the eating outcome, when the food is visible due to transparent (vs. opaque) packaging (displaying both sensory and instrumental properties), but that no such differences emerge for AR. This research highlights the importance of using different visualisation modes to promote food depending on the product format. The findings have important implications for both offline and online retailers. 相似文献
4.
In the context of personal income tax (PIT) reform in China in 2018, this paper examines some of the major issues of concern regarding the reform and income distribution. Using the China Personal Income Tax Micro‐simulation model, the paper compares the differences between the 2011 and 2018 PIT systems, and finds that residents relying on different income sources may face a large degree of real tax rate change. Once the tax system is altered to PIT 2018, the coverage of PIT for wage earners will decrease from 46.9 to 23.4 percent, the income redistributive effect will drop from 1.95 to 1.22 percent and the PIT's role in fiscal revenue will also be negatively affected. Nevertheless, if individual income continues to grow, the share of PIT in fiscal revenue is expected to return to the 2018 level in 2022, but its income redistribution function is difficult to recover in the short term. The paper finds that the effect of PIT on income distribution depends on the tax structure. Gradual transition to an “entirely comprehensive” tax system when conditions are appropriate will achieve better income redistribution results at a lower average tax rate. 相似文献
5.
The paper presents a new methodology, based on tensor decomposition, to map dynamic trade networks and to assess its strength in forecasting economic fluctuations at different periods of time in Asia. Using the monthly merchandise import and export data across 33 Asian economies, together with the US, EU and UK, we detect the community structure of the evolving network and we identify clusters and central nodes inside each of them. Our findings show that data are well represented by two communities, in which People's Republic of China and Japan play the major role. We then analyze the synchronisation between GDP growth and trade. Furthermore we apply our model to the prediction of economic fluctuations. Our findings show that the model leads to an increase in predictive accuracy, as higher order interactions between countries are taken into account. 相似文献
6.
The credit risk contagion of Internet peer-to-peer (P2P) lending platforms is an important part of Internet financial risk management and supervision. This study analyzes the contagion path of credit risk in Internet P2P lending. Based on complex network theory and the theory of infectious disease dynamics, the characteristics of Internet P2P lending development are combined to construct a SEIR model of credit risk transmission among Internet P2P lending platforms with time lag, and the robustness of the model is analyzed and proven. The influence of platform correlations, the susceptible immune rate, the platform elimination rate, contagion latency, the saturation coefficient, and the susceptibility input rate on credit risk contagion behavior among Internet P2P lending platforms is analyzed, using the equilibrium point and threshold value. The impact of each variable is analyzed by simulation. Corresponding countermeasures and suggestions are proposed to prevent and control credit risk contagion among these platforms. 相似文献
7.
探究黑龙江旅游网络关注度时空演变特征对黑龙江旅游业良性发展具有重要意义.利用百度指数获取2011—2018年全国和分地区黑龙江旅游网络关注度逐日搜索指数数据.从时间分布、空间分布、时空集聚3个方面研究其演变特征.研究表明:2011—2018年全国黑龙江旅游网络关注度年际变化总体呈现上升趋势,月际变化呈"W"形;2011—2018年31个省区市黑龙江旅游网络关注度空间差异较大、季节性影响显著;东部地区黑龙江旅游网络关注度偏高,西部地区黑龙江旅游网络关注度的季节差异最明显;东部地区内的黑龙江旅游网络关注度差异性最小,西部地区内差异性最大;黑龙江旅游网络关注度具有正空间自相关,部分东部、中部地区表现为高高集聚,多数西部地区表现为低低集聚. 相似文献
8.
Marcin Maleszka 《Enterprise Information Systems》2019,13(7-8):1120-1142
ABSTRACTWe present a group dynamics model that shows knowledge integration as a process occurring over time. As each individual in the group contact others, his own knowledge changes, and over time the collective knowledge is obtained. This allows modeling knowledge diffusion in a social network and while the models presented in this paper are not competitive in that area, they approach the problem from previously unconsidered direction. We test the behavior of the model in a multi-agent simulation and we test a simple advertisement campaign in a social network. We provide discussion of elements needed for making model more competitive. 相似文献
9.
10.
随着网络技术的广泛应用,网络安全也越来越受到重视。本简述了网络安全问题的定义和TCP/IP协议的安全漏洞。同时,介绍了当前网络采用的安全技术。 相似文献